Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

Create Rules Based on Entourage Messages

When creating rules in Entourage 2008, you can save some time by selecting a message like those you want the rule to work on before defining the rule. That way, when you add criteria to your rule, Entourage fills in the data based on the data in the selected message. So if you wanted to filter messages containing TidBITS, you could select an issue and add a new "From Contains" criterion to a rule. Entourage will automatically fill in the editors@tidbits.com address in the criterion.

Visit Mactopia - Entourage 2008 for Mac

 

 

Recent TidBITS Talk Discussions
 
 

GadgetTrak 3 Locates Stolen Laptops

Cars use LoJack. For iPads and iPhones, there's MobileMe's Find My iPhone feature. But how do you find your MacBook or MacBook Pro if someone steals it? GadgetTrak Laptop may be the perfect solution.

The concept works like this: You install GadgetTrak on your Mac, and if it's stolen, you activate the software remotely. Then, GadgetTrak aims to help you find your Mac, even providing photos of the thieves themselves. That's the pitch, at least. But how well does it work? I'm hesitant to test this by leaving my laptop at Starbucks, but GadgetTrak's blog links to news stories about the company's software helping recover a number of stolen laptops across the country, including a theft ring that was targeting schools in Portland, Oregon.

Nevertheless, I wanted to test GadgetTrak to the extent I could without endangering my Mac. The first step is deciding which license you want, since what you're really buying is GadgetTrak's monitoring service. You can order GadgetTrak Laptop for $34.95 for one year, or $74.95 for three years. A Family Pack, which lets you install the software on up to five Macs and PCs, costs $99.95 for one year, and $199.95 for three years.

Once you've decided, you download and install the software, which, on the Mac, lives mostly in System Preferences. Note that a restart is required after you first install GadgetTrak. When I initially tried to install the software, its preference pane didn't appear properly after my first reboot; after I ran the uninstaller and then re-ran the installer itself, everything worked perfectly. The company said it hasn't seen this problem, but since GadgetTrak 3 has just come out, it would be watching for similar installation issues in its support system.

Configuring the software after installation isn't particularly difficult or even time-consuming, but it does require several steps. You enter your license code and provide a name for your Mac in the preference pane, and then you also need to create an account on the GadgetTrak Web site and verify your email address. You receive numerous confirmation email messages as you work through this process. After you've created your account and activated the GadgetTrak preference pane, you're good to go.

And the clever developers at GadgetTrak know exactly what you're thinking at this point: Is it working? Thus, the preference pane sports a Test Tracking button, which almost instantly kicks back an email message to you showing your Mac's geographic location. GadgetTrak figures out where your laptop is via Wi-Fi positioning. In my testing, the tool was astonishingly accurate at determining my location.


Obviously, though, you can't really put GadgetTrak through its paces unless your Mac is stolen. If that happens, you activate the tracker via the Web site, and GadgetTrak gets to work. In my testing, while the Test Tracking button worked immediately, it took about 25 minutes for the service to update me on my "stolen" Mac's location when I turned on live tracking.

Again, though, once it was active, GadgetTrak was impressively precise at identifying my laptop's whereabouts. Beyond your stolen Mac's location, GadgetTrak also snaps photos using the laptop's built-in iSight camera and sends them to you via email. When I had the software running in thief-tracking mode - and then forgot all about it - it managed to snap a creepy photo of me looking shifty without my noticing.


Once you activate tracking, GadgetTrak continues to send you periodic updates on your Mac's whereabouts whenever the laptop is powered on and connected to the Internet. The bad guys can't disable the tracking without your administrative password, and very likely wouldn't even know it's happening. For those especially concerned about privacy, you can configure the software to use your own custom mail server settings when it sends you tracking email messages and photographs, instead of relying on GadgetTrak's servers.

That GadgetTrak's tracking is powered entirely via a Flash-free Web site is great; you can use the site from your iPhone or iPad if you're on the go when you realize your MacBook Pro has gone missing.

Unlike competitor Undercover (see "Undercover Theft-Recovery Software Update Gives You the Details," 19 April 2010), GadgetTrak doesn't take screenshots of your stolen machine that might reveal identifying information about the thief. Ian Schray of GadgetTrak told me that conversations with police around the country have led the company to believe that screenshots aren't that valuable in the recovery process. Plus, he said that such a feature could be construed as violating wiretap laws, so GadgetTrak has shied away from it.

What the recent GadgetTrak 3 upgrade does include, however, are assorted improvements for tracking more devices and keeping better records. The latest release includes a centralized, Web-based console to track all the laptops on your account, and makes it easier to manage multiple machines. The software also now logs historical tracking data; instead of merely looking up where your laptop is right now, you can see where it has been recently, too.

Armed with your stolen laptop's geographical location, and a photo of what may very well be the individual who stole it, you'll have better luck than most folks seeking help from law enforcement. Most of us probably won't ever need GadgetTrak, but it's like any other kind of insurance: You're really, really, really glad it's there if you ever do need it.

 

With ChronoSync you can sync, back up, or make bootable backups.
Sync or back up your Mac to internal or external hard drives, other
Macs, PCs, or remote network volumes you can mount on your Mac.
Learn more at <http://www.econtechnologies.com/tb.html>!
 

Comments about GadgetTrak 3 Locates Stolen Laptops

To leave a comment, click Add a Comment and then enter the text, your name, and your email address (which won't be displayed). Your comment will appear after you follow a link in the one-time confirmation message we send to verify that you're a real person.
Add a comment
So do you get in trouble if your stolen laptop snaps a picture of an unsuspecting person related to the thief that could be considered pornographic in nature? Especially if that picture is of a child? Not that I want to protect the rights of the lawbreaker, but someone will probably think of that and sue.
Reply
Adam Engst2010-08-04 10:56
Since you receive all the photos in email, I imagine you'd just delete anything that was obviously unrelated. There's no reason you have to share unrelated photos with the police, and I think the people whose photos are being taken wouldn't have much recourse if they're using stolen property.

Where this came up is in the Pennsylvania school district where other theft-recovery software was taking pictures when it shouldn't have.

http://www.pcworld.com/article/202237/school_sued_over_webcam_spying_on_students.html
Reply
I knew I'd heard something about a school district having problems. I even searched it before making my comment, but I guess I didn't use the right keyword because I couldn't find the story. Thanks for sharing that link. I'm glad to refresh my memory on that.
Reply
I have GadgetTrak as well but luckily have not had to use it yet.

Two things...

1. I don't particularly care for my gadgettrak key being so easy to see if someone were to get access to my system and look in the system preferences.

2. One of the gotchas with using email is that you're going to have to hope that the outgoing port isn't blocked on the network that the stolen device is connected to. Different internet providers have been blocking ports to control spam and viruses. I don't know what port GadgetTrak uses but be particularly aware if you use your own email server for this purpose.
Reply
James Massey2010-08-09 16:30
Unless one has set their machine up with no password, this type of theft protection is pretty useless. That's because the stolen machine must be running moreless unmodified to "phone home," and that's only going to happen if the thief can easily start up the system. If the thief encounters any difficulty in starting up (e.g., a password), the first thing he'll do is reformat the hard drive and install a fresh system. That, of course, wipes the anti-theft software and completely defeats its "raison d'etre."
Reply
Glenn Fleishman2010-08-09 19:33
You set up a Guest account, so that thieves are more likely to try to reboot and access the machine.
Reply
Adam Engst2010-08-10 06:33
Seems to me that a lot of laptops are probably stolen while sleeping (the laptops, not their owners), and thus the thief can use it unless the user has also set it to require a password on screensaver and waking up.
Reply
Bob Peterson2010-08-13 15:09
An unpassworded guest account seems like inviting Internet hacking.
Reply
Glenn Fleishman2010-08-13 17:20
Doesn't work that way. Apple has quite assiduously disabled remote guest/nobody/anonymous access even on guest accounts.
Reply
Jonas Smithson2010-08-09 19:25
The main reason I suspect this kind of product is useless is that people who've gone to the cops with the info discovered that the cops didn't understand what they were talking about, and weren't interested in following the leads even if they did understand. Typically (from what I've read online) the cops don't care, and just tell the victim to contact their insurance company. So what's the point?
Reply
Glenn Fleishman2010-08-09 19:35
I'm sure that happens, but I've also read dozens of cases in which theft-recovery information led directly to police action and some kind of result.

Mileage varies. In Seattle, there are pretty savvy divisions of police, and if you walked in with a printout of a map or a live feed of the laptop, I believe you'd get action.

One reason the police often respond (in what I've read and heard directly from people whose machines have been stolen) is that with an address and a photo, police have probable cause. They can get a warrant. And often they find piles of stolen hardware.
Reply
David Black2010-08-10 04:20
I purchased version 2.0 of this software. Sadly, I never could get it to work and never got a refund. I've since purchased LoJack from Apple Store, which installs seamlessly and invisibly.
Reply
Ian Schray2010-08-10 09:38
Thanks for the comments, David. I'm the GadgetTrak Product Manager, and I hope you don't mind me commenting publicly here.

I'm sorry if you requested and never received a refund, that's certainly not our normal procedure.

With our newly-released GadgetTrak 3, we've greatly enhanced our tracking interface (all web-based now!) while simplifying the installation process. I hope you'll consider giving it another try!
Reply
Castaicmac2010-08-11 11:09
August 10, 2010, (after reading TidBits article) purchased, downloaded, installed GT 3.0, registered it and set up "Guest" acct. (w/no PW req.) on my MBPro. The email info from GT is set up to be sent to my desk top iMac. Within 15 minutes of turning on my MBPro to do some general maintenance within my personal MBPro acct, my iMac email alert shows my MBP within 15 feet from its actual location. Very impressed! There I was, leering into my MBPro screen as I worked. For less than a dime a day I have more peace of mind while taking my MBPro into the wild. Logged back into developer's web site and deactivated tracking. Very easily done. Highly recommend this product.
Reply
To leave a comment, click Add a Comment and then enter the text, your name, and your email address (which won't be displayed). Your comment will appear after you follow a link in the one-time confirmation message we send to verify that you're a real person.
Add a comment